The biggest, most important, incredible (especially in the context of discussion between Director of NSA and Attendees on another conference <Black Hat>) conference focused for security, cyber security, ethical hacking and more. It was held in Las Vegas between 1st and 4th August. Def Con 21. Some of us cannot be there, maybe in next year, but we can get (and share) two parts of materials form DefCon.
PRIMARY – unofficial sessions (I found it on blog post here). And here is the list of available for download (394 MB) sessions:
- Kang-Cruz-RESTing-On-Your-Laurels-Will-Get-You-Pwned.pdf
- Caceres-Massive-Attacks-With-Distributed-Computing.pdf
- Pinto-Defending-Networks-Machine-Learning-WP.pdf
- Pinto-Defending-Networks-Machine-Learning.pdf
- Baldet-Suicide-Intervention-Risk-Assessment-Tactics.pdf
- Davis-Revealing-Embedded-Fingerprints.pdf
- Balint-Seeber-All-Your-RFz-Are-Belong-to-Me.pdf
- Bogdan-Alecu-Attacking-SIM-Toolkit-with-SMS-WP.pdf
- Bogdan-Alecu-Business-Logic-Flaws-in-MO.pdf
- OConnor-Stalking-a-City-for-Fun-and-Frivolity.pdf
- Gorenc-Spelman-Java-Every-days-WP.pdf
- Gorenc-Spelman-Java-Every-days.pdf
- Riley-Defense-by-Numbers.pdf
- Sumner-Wald-Prediciting-Susceptibility-To-Social-Bots-On-Twitter.pdf
- Dudley-Privacy-In-DSRC-Connected-Vehicles.pdf
- Young-Google-Skeleton-Key.pdf
- Crowley-Savage-Bryan-Home-Invasion-2.0-WP.pdf
- Crowley-Savage-Bryan-Home-Invasion-2.0.pdf
- Dan-Griffin-Protecting-Data.pdf
- Chechik-Utilizing-Popular-Websites-for-Malicious-Purposes-Using-RDI.pdf
- Selifonov-A-Password-is-Not-Enough-Why-Disk-Encryption-is-Broken.pdf
- Fulton-Zolnikov-The-Politics-of-Privacy-and-Technology.pdf
- Milam-Getting-The-Goods-With-smbexec.pdf
- Etemadieh-Panel-Google-TV-Secure-Boot-Exploit-GTVHacker.pdf
- Ozavci-VoIP-Wars-Return-of-the-SIP.pdf
- Flipper-10000-Yen.pdf
- Payer-Exploiting-Music-Streaming-with-JavaScript.pdf
- Pickett-Lets-Screw-With-NMAP.pdf
- Scott-Security-in-Cognitive-Radio-Networks.pdf
- Thompson-CREAM-Cache-Rules-Evidently-Ambiguous-Misunderstood.pdf
- Schultz-Examining-the-Bitsquatting-Attack-Surface-WP.pdf
- Staggs-How-to-Hack-Your-Mini-Cooper-WP.pdf
- Staggs-How-to-Hack-Your-Mini-Cooper.pdf
- Denaro-How-to-Disclose-or-Sell-an-Exploit.pdf
- Bialek-PowerPwning-Post-Exploiting-by-Overpowering-Powershell.pdf
- Grand-JTAGulator.pdf
- Ortiz-Fast-Forensics-Using-Simple-Statistics-and-Cool-Tools.pdf
- Engler-Vines-Electromechanical-PIN-Cracking-WP.pdf
- Engler-Vines-Electromechanical-PIN-Cracking.pdf
- Justin-Hendricks-So-You-Think-Your-Domain-Controller-Is-Secure.pdf
- Koscher-Butler-The-Secret-Life-of-SIM-Cards.pdf
- Lawrence-Johnson-Karpman-Key-Decoding-and-Duplication-Schlage.pdf
- Tobias-Bluzmanis-Insecurity-A-Failure-of-Imagination.pdf
- Marschalek-Thorny-Malware.pdf
- Perklin-ACL-Steganography.pdf.pdf
- Schrenk-How-my-Botnet-Defeated-Russian-Hackers.pdf
- Chow-Abusing-NoSQL-Databases.pdf
- Sikka-EMET-4.0-PKI-Mitigation.pdf
- Oberli-Please-Insert-Inject-More-Coins.pdf
- Mittal-Powerpreter-Post-Exploitation-Like-a-Boss.pdf
- Fora-Defeating-SEAndroid.pdf
- Polstra-We-are-Legion-Pentesting.pdf
- Phorkus-Evilrob-Hacking-Embedded-Devices-Bad-things-to-Good-hardware.pdf
- Duszynski-Cyber-Offenders.pdf
- Pukingmonkey-The-Road-Less-Surreptitiously-Traveled.pdf
- Baumgarten-Mach-O-Viz-WP.pdf
- Baumgarten-Mach-O-Viz.pdf
- Richard-Thieme-UFOs-and-Govt.pdf
- Ricky-Hill-Phantom-Drone.pdf
- Clark-Legal-Aspects-of-Full-Spectrum-Computer-Network-Active-Defense.pdf
- Stucke-DNS-Hazards.pdf
- Sandvik-Safety-of-the-Tor-Network.pdf
- Holeman-The-Bluetooth-Device-Database.pdf
- Bowne-SSD-Data-Evap.pdf
- Bowne-Prince-Evil-DoS-Attacks-and-Strong-Defenses.pdf
- Behrens-Bandelgar-MITM-All-The-IPv6-Things.pdf
- Rogers-Caceres-The-Dawn-of-Web-30.pdf
- Tom-Keenan-Torturing-Open-Government-Systems-for-Fun.pdf
- Steele-Kottman-Collaborative-Penetration-Testing-With-Lair.pdf
- Miu-Lee-Kill-em-All-DDoS-Protection-Total-Annihilation.pdf
- Toukharian-Gevorgyan-HTTP-Time-Bandit.pdf
- McGrew-Pwn-The-Pwn-Plug .pdf
- McGrew-Pwn-The-Pwn-Plug-WP.pdf
- WiK-Mubix-gitDigger.pdf
- Blacher-Transcending-Cloud-Limitations.pdf
- source-Code-dpk-master.zip
- Zoz-Hacking-Driverless-Vehicles.pdf
- bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT-WP.pdf
- bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT.pdf
- m0nk-BoutiqueKit.pdf
- soen-Evolving-Exploits-Through-Genetic-Algorithms.pdf
SECONDARY – very important too – The Def Con 21 Soundtrack:
- BT – The Gathering Darkness 13:12
- Dual Core – Fear and Chaos (Dale Chase Remix) 04:35
- ytcracker – Bitcoin Baron 03:29
- BLEO – The Carterfone Decision 01:47
- Swinging Rabbits – Monster (Gunslinger vs Blare Remix) 04:14
- Psymbionic & Great Scott – Computronium 04:39
- Gramatik – Talkbox Intended 06:10
- PANTyRAiD – Jokes from the Backseat 04:38
- DJ RoboRob – The Great Divide ft. Dual Core 04:11
- BREDE – Crush On 04:04
- Karton – Chase It High (Left/Right Remix) 06:00
- Royal Sapien presents No Context – For the Breakers (DEF CON Edit) 04:23
- Son of the Electric Ghost – Beat It Kids 05:23
- Nick Stoynoff presents NOFF – Aryt 03:20
- A.E. Burdick – Room 101 06:35
- Faderhead – Free 03:42
- MDMM – Octopus (Redux) 07:25
- Vigilante – It’s Our Time (Electro Version) 03:00
- BlakOPz – BlakOUt 05:59
- Bud Melvin – Trolling is a Art 02:48
Soundtrack is available for download for free or if You want to pay, You can choose appropriate quality. Formats for standard users: MP3 V0 and MP3 320 and of course for Audiophiles and NERDS (!): FLAC, AAC, ALAC, OGG – from 143 to 712 MB.
DEF CON 21: The Official Soundtrack
____
ENJOY!
0 Comments.